id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2407.01996 | ViG-Bias: Visually Grounded Bias Discovery and Mitigation | The proliferation of machine learning models in critical decision making processes has underscored the need for bias discovery and mitigation strategies. Identifying the reasons behind a biased system is not straightforward, since in many occasions they are associated with hidden spurious correlations which are not eas... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 469,543 |
2205.10798 | PAC-Wrap: Semi-Supervised PAC Anomaly Detection | Anomaly detection is essential for preventing hazardous outcomes for safety-critical applications like autonomous driving. Given their safety-criticality, these applications benefit from provable bounds on various errors in anomaly detection. To achieve this goal in the semi-supervised setting, we propose to provide Pr... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 297,878 |
1711.00532 | SCDA: School Compatibility Decomposition Algorithm for Solving the
Multi-School Bus Routing and Scheduling Problem | Safely serving the school transportation demand with the minimum number of buses is one of the highest financial goals of school transportation directors. To achieve that objective, a good and efficient way to solve the routing and scheduling problem is required. Due to the growth of the computing power, the spotlight ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 83,734 |
2412.02689 | Preliminary Investigation into Data Scaling Laws for Imitation
Learning-Based End-to-End Autonomous Driving | The end-to-end autonomous driving paradigm has recently attracted lots of attention due to its scalability. However, existing methods are constrained by the limited scale of real-world data, which hinders a comprehensive exploration of the scaling laws associated with end-to-end autonomous driving. To address this issu... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 513,639 |
2010.15025 | Non-Autoregressive Transformer ASR with CTC-Enhanced Decoder Input | Non-autoregressive (NAR) transformer models have achieved significantly inference speedup but at the cost of inferior accuracy compared to autoregressive (AR) models in automatic speech recognition (ASR). Most of the NAR transformers take a fixed-length sequence filled with MASK tokens or a redundant sequence copied fr... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 203,648 |
2402.18302 | EchoTrack: Auditory Referring Multi-Object Tracking for Autonomous
Driving | This paper introduces the task of Auditory Referring Multi-Object Tracking (AR-MOT), which dynamically tracks specific objects in a video sequence based on audio expressions and appears as a challenging problem in autonomous driving. Due to the lack of semantic modeling capacity in audio and video, existing works have ... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 433,377 |
2110.14842 | Towards the ultimate limits of quantum channel discrimination | This note studies the difficulty of discriminating quantum channels under operational regimes. First, we make a conjecture on the exponentially strong converse of quantum channel hypothesis testing under coherent strategies, meaning that any strategy to make the Type II error decays with an exponent larger than the reg... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 263,660 |
2501.04517 | Histogram-Equalized Quantization for logic-gated Residual Neural
Networks | Adjusting the quantization according to the data or to the model loss seems mandatory to enable a high accuracy in the context of quantized neural networks. This work presents Histogram-Equalized Quantization (HEQ), an adaptive framework for linear symmetric quantization. HEQ automatically adapts the quantization thres... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 523,251 |
2209.12244 | Multimodal Channel-Mixing: Channel and Spatial Masked AutoEncoder on
Facial Action Unit Detection | Recent studies have focused on utilizing multi-modal data to develop robust models for facial Action Unit (AU) detection. However, the heterogeneity of multi-modal data poses challenges in learning effective representations. One such challenge is extracting relevant features from multiple modalities using a single feat... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 319,465 |
2409.18257 | Developing a Dual-Stage Vision Transformer Model for Lung Disease
Classification | Lung diseases have become a prevalent problem throughout the United States, affecting over 34 million people. Accurate and timely diagnosis of the different types of lung diseases is critical, and Artificial Intelligence (AI) methods could speed up these processes. A dual-stage vision transformer is built throughout th... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 492,161 |
2107.02070 | Antithetic Riemannian Manifold And Quantum-Inspired Hamiltonian Monte
Carlo | Markov Chain Monte Carlo inference of target posterior distributions in machine learning is predominately conducted via Hamiltonian Monte Carlo and its variants. This is due to Hamiltonian Monte Carlo based samplers ability to suppress random-walk behaviour. As with other Markov Chain Monte Carlo methods, Hamiltonian M... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 244,691 |
0903.1139 | The Complexity of Reasoning with Global Constraints | Constraint propagation is one of the techniques central to the success of constraint programming. To reduce search, fast algorithms associated with each constraint prune the domains of variables. With global (or non-binary) constraints, the cost of such propagation may be much greater than the quadratic cost for binary... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 3,297 |
2104.09556 | Removing Diffraction Image Artifacts in Under-Display Camera via Dynamic
Skip Connection Network | Recent development of Under-Display Camera (UDC) systems provides a true bezel-less and notch-free viewing experience on smartphones (and TV, laptops, tablets), while allowing images to be captured from the selfie camera embedded underneath. In a typical UDC system, the microstructure of the semi-transparent organic li... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 231,270 |
2303.14628 | Multi-Frame Self-Supervised Depth Estimation with Multi-Scale Feature
Fusion in Dynamic Scenes | Multi-frame methods improve monocular depth estimation over single-frame approaches by aggregating spatial-temporal information via feature matching. However, the spatial-temporal feature leads to accuracy degradation in dynamic scenes. To enhance the performance, recent methods tend to propose complex architectures fo... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 354,178 |
2103.05150 | Orientation to Pose: Continuum Robots Shape Sensing Based on Piecewise
Polynomial Curvature Model | Continuum robots are typically slender and flexible with infinite freedoms in theory, which poses a challenge for their control and application. The shape sensing of continuum robots is vital to realise accuracy control. This letter proposed a novel general real-time shape sensing framework of continuum robots based on... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 223,882 |
1003.0445 | On The Design of Signature Codes in Decentralized Wireless Networks | This paper addresses a unified approach towards communication in decentralized wireless networks of separate transmitter-receiver pairs. In general, users are unaware of each other's codebooks and there is no central controller to assign the resources in the network to the users. A randomized signaling scheme is introd... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 5,819 |
2110.11891 | On the Necessity of Auditable Algorithmic Definitions for Machine
Unlearning | Machine unlearning, i.e. having a model forget about some of its training data, has become increasingly more important as privacy legislation promotes variants of the right-to-be-forgotten. In the context of deep learning, approaches for machine unlearning are broadly categorized into two classes: exact unlearning meth... | false | false | false | false | true | false | true | false | false | false | false | false | true | false | false | false | false | false | 262,645 |
2402.03774 | Learning a Decision Tree Algorithm with Transformers | Decision trees are renowned for their ability to achieve high predictive performance while remaining interpretable, especially on tabular data. Traditionally, they are constructed through recursive algorithms, where they partition the data at every node in a tree. However, identifying a good partition is challenging, a... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 427,186 |
0708.3920 | Kinematic analysis of the 3-RPR parallel manipulator | The aim of this paper is the kinematic study of a 3-RPR planar parallel manipulator where the three fixed revolute joints are actuated. The direct and inverse kinematic problem as well as the singular configuration is characterized. On parallel singular configurations, the motion produce by the mobile platform can be c... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 609 |
1205.4875 | A New Approach Towards the Golomb-Welch Conjecture | The Golomb-Welch conjecture deals with the existence of perfect $e$% -error correcting Lee codes of word length $n,$ $PL(n,e)$ codes. Although there are many papers on the topic, the conjecture is still far from being solved. In this paper we initiate the study of an invariant connected to abelian groups that enables u... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 16,125 |
2308.03908 | ViLP: Knowledge Exploration using Vision, Language, and Pose Embeddings
for Video Action Recognition | Video Action Recognition (VAR) is a challenging task due to its inherent complexities. Though different approaches have been explored in the literature, designing a unified framework to recognize a large number of human actions is still a challenging problem. Recently, Multi-Modal Learning (MML) has demonstrated promis... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 384,211 |
2402.03220 | The Benefits of Reusing Batches for Gradient Descent in Two-Layer
Networks: Breaking the Curse of Information and Leap Exponents | We investigate the training dynamics of two-layer neural networks when learning multi-index target functions. We focus on multi-pass gradient descent (GD) that reuses the batches multiple times and show that it significantly changes the conclusion about which functions are learnable compared to single-pass gradient des... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 426,908 |
2001.10516 | Tri-graph Information Propagation for Polypharmacy Side Effect
Prediction | The use of drug combinations often leads to polypharmacy side effects (POSE). A recent method formulates POSE prediction as a link prediction problem on a graph of drugs and proteins, and solves it with Graph Convolutional Networks (GCNs). However, due to the complex relationships in POSE, this method has high computat... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 161,845 |
2411.15100 | XGrammar: Flexible and Efficient Structured Generation Engine for Large
Language Models | The applications of LLM Agents are becoming increasingly complex and diverse, leading to a high demand for structured outputs that can be parsed into code, structured function calls, and embodied agent commands. These developments bring significant demands for structured generation in LLM inference. Context-free gramma... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | true | 510,437 |
2104.13293 | Evidential segmentation of 3D PET/CT images | PET and CT are two modalities widely used in medical image analysis. Accurately detecting and segmenting lymphomas from these two imaging modalities are critical tasks for cancer staging and radiotherapy planning. However, this task is still challenging due to the complexity of PET/CT images, and the computation cost t... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 232,461 |
1312.6130 | A Functional View of Strong Negation in Answer Set Programming | The distinction between strong negation and default negation has been useful in answer set programming. We present an alternative account of strong negation, which lets us view strong negation in terms of the functional stable model semantics by Bartholomew and Lee. More specifically, we show that, under complete inter... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 29,320 |
1810.06765 | A survey of automatic de-identification of longitudinal clinical
narratives | Use of medical data, also known as electronic health records, in research helps develop and advance medical science. However, protecting patient confidentiality and identity while using medical data for analysis is crucial. Medical data can be in the form of tabular structures (i.e. tables), free-form narratives, and i... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 110,499 |
2110.12798 | Variational Gaussian Processes: A Functional Analysis View | Variational Gaussian process (GP) approximations have become a standard tool in fast GP inference. This technique requires a user to select variational features to increase efficiency. So far the common choices in the literature are disparate and lacking generality. We propose to view the GP as lying in a Banach space ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 262,972 |
2205.11672 | Why does Throwing Away Data Improve Worst-Group Error? | When facing data with imbalanced classes or groups, practitioners follow an intriguing strategy to achieve best results. They throw away examples until the classes or groups are balanced in size, and then perform empirical risk minimization on the reduced training set. This opposes common wisdom in learning theory, whe... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 298,227 |
2407.09777 | Graph Transformers: A Survey | Graph transformers are a recent advancement in machine learning, offering a new class of neural network models for graph-structured data. The synergy between transformers and graph learning demonstrates strong performance and versatility across various graph-related tasks. This survey provides an in-depth review of rec... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 472,711 |
1407.2812 | Rate-Optimal Detection of Very Short Signal Segments | Motivated by a range of applications in engineering and genomics, we consider in this paper detection of very short signal segments in three settings: signals with known shape, arbitrary signals, and smooth signals. Optimal rates of detection are established for the three cases and rate-optimal detectors are constructe... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 34,566 |
2109.02517 | Error Controlled Actor-Critic | On error of value function inevitably causes an overestimation phenomenon and has a negative impact on the convergence of the algorithms. To mitigate the negative effects of the approximation error, we propose Error Controlled Actor-critic which ensures confining the approximation error in value function. We present an... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 253,776 |
2206.08724 | Crowdsourcing Relative Rankings of Multi-Word Expressions: Experts
versus Non-Experts | In this study we investigate to which degree experts and non-experts agree on questions of difficulty in a crowdsourcing experiment. We ask non-experts (second language learners of Swedish) and two groups of experts (teachers of Swedish as a second/foreign language and CEFR experts) to rank multi-word expressions in a ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 303,266 |
2407.15472 | Learning deep illumination-robust features from multispectral filter
array images | Multispectral (MS) snapshot cameras equipped with a MS filter array (MSFA), capture multiple spectral bands in a single shot, resulting in a raw mosaic image where each pixel holds only one channel value. The fully-defined MS image is estimated from the raw one through \textit{demosaicing}, which inevitably introduces ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 475,199 |
2103.04469 | Local word statistics affect reading times independently of surprisal | Surprisal theory has provided a unifying framework for understanding many phenomena in sentence processing (Hale, 2001; Levy, 2008a), positing that a word's conditional probability given all prior context fully determines processing difficulty. Problematically for this claim, one local statistic, word frequency, has al... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 223,644 |
2309.06188 | Computer Vision Pipeline for Automated Antarctic Krill Analysis | British Antarctic Survey (BAS) researchers launch annual expeditions to the Antarctic in order to estimate Antarctic Krill biomass and assess the change from previous years. These comparisons provide insight into the effects of the current environment on this key component of the marine food chain. In this work we have... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 391,341 |
2409.08202 | What Makes a Maze Look Like a Maze? | A unique aspect of human visual understanding is the ability to flexibly interpret abstract concepts: acquiring lifted rules explaining what they symbolize, grounding them across familiar and unfamiliar contexts, and making predictions or reasoning about them. While off-the-shelf vision-language models excel at making ... | false | false | false | false | true | false | true | false | true | false | false | true | false | false | false | false | false | false | 487,807 |
2112.08789 | Harnessing Cross-lingual Features to Improve Cognate Detection for
Low-resource Languages | Cognates are variants of the same lexical form across different languages; for example 'fonema' in Spanish and 'phoneme' in English are cognates, both of which mean 'a unit of sound'. The task of automatic detection of cognates among any two languages can help downstream NLP tasks such as Cross-lingual Information Retr... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 271,938 |
2207.05321 | Bi-fidelity Evolutionary Multiobjective Search for Adversarially Robust
Deep Neural Architectures | Deep neural networks have been found vulnerable to adversarial attacks, thus raising potentially concerns in security-sensitive contexts. To address this problem, recent research has investigated the adversarial robustness of deep neural networks from the architectural point of view. However, searching for architecture... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | 307,499 |
2201.10095 | RecShard: Statistical Feature-Based Memory Optimization for
Industry-Scale Neural Recommendation | We propose RecShard, a fine-grained embedding table (EMB) partitioning and placement technique for deep learning recommendation models (DLRMs). RecShard is designed based on two key observations. First, not all EMBs are equal, nor all rows within an EMB are equal in terms of access patterns. EMBs exhibit distinct memor... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 276,876 |
2107.11020 | Emotion analysis and detection during COVID-19 | Crises such as natural disasters, global pandemics, and social unrest continuously threaten our world and emotionally affect millions of people worldwide in distinct ways. Understanding emotions that people express during large-scale crises helps inform policy makers and first responders about the emotional states of t... | false | false | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | 247,474 |
2405.17955 | Efficient Prior Calibration From Indirect Data | Bayesian inversion is central to the quantification of uncertainty within problems arising from numerous applications in science and engineering. To formulate the approach, four ingredients are required: a forward model mapping the unknown parameter to an element of a solution space, often the solution space for a diff... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 458,206 |
2012.13504 | LMMSE Processing for Cell-free Massive MIMO with Radio Stripes and MRC
Fronthaul | Cell-free massive MIMO provides ubiquitous connectivity for multiple users, and implementation using radio stripes is very efficient. Compared with collocated massive MIMO, the major cost includes fronthaul overheads and AP hardware. Maximum ratio combination (MRC) achieves a low fronthaul loading and low-cost AP, but ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 213,236 |
1912.02914 | RED-NET: A Recursive Encoder-Decoder Network for Edge Detection | In this paper, we introduce RED-NET: A Recursive Encoder-Decoder Network with Skip-Connections for edge detection in natural images. The proposed network is a novel integration of a Recursive Neural Network with an Encoder-Decoder architecture. The recursive network enables us to increase the network depth without incr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 156,464 |
2401.03085 | Consensus-Threshold Criterion for Offline Signature Verification using
Convolutional Neural Network Learned Representations | A genuine signer's signature is naturally unstable even at short time-intervals whereas, expert forgers always try to perfectly mimic a genuine signer's signature. This presents a challenge which puts a genuine signer at risk of being denied access, while a forge signer is granted access. The implication is a high fals... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 419,959 |
2411.14639 | Differentially Private Adaptation of Diffusion Models via Noisy
Aggregated Embeddings | We introduce novel methods for adapting diffusion models under differential privacy (DP) constraints, enabling privacy-preserving style and content transfer without fine-tuning. Traditional approaches to private adaptation, such as DP-SGD, incur significant computational overhead and degrade model performance when appl... | false | false | false | false | false | false | true | false | false | false | false | true | true | false | false | false | false | false | 510,257 |
2203.04111 | Plumeria at SemEval-2022 Task 6: Robust Approaches for Sarcasm Detection
for English and Arabic Using Transformers and Data Augmentation | This paper describes our submission to SemEval-2022 Task 6 on sarcasm detection and its five subtasks for English and Arabic. Sarcasm conveys a meaning which contradicts the literal meaning, and it is mainly found on social networks. It has a significant role in understanding the intention of the user. For detecting sa... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 284,352 |
1811.04129 | STA: Spatial-Temporal Attention for Large-Scale Video-based Person
Re-Identification | In this work, we propose a novel Spatial-Temporal Attention (STA) approach to tackle the large-scale person re-identification task in videos. Different from the most existing methods, which simply compute representations of video clips using frame-level aggregation (e.g. average pooling), the proposed STA adopts a more... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 112,998 |
2404.12810 | Enhancing Counterfactual Explanation Search with Diffusion Distance and
Directional Coherence | A pressing issue in the adoption of AI models is the increasing demand for more human-centric explanations of their predictions. To advance towards more human-centric explanations, understanding how humans produce and select explanations has been beneficial. In this work, inspired by insights of human cognition we prop... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 448,044 |
2410.08218 | A Visual-Analytical Approach for Automatic Detection of Cyclonic Events
in Satellite Observations | Estimating the location and intensity of tropical cyclones holds crucial significance for predicting catastrophic weather events. In this study, we approach this task as a detection and regression challenge, specifically over the North Indian Ocean (NIO) region where best tracks location and wind speed information serv... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 497,012 |
2012.14736 | Present-Biased Optimization | This paper explores the behavior of present-biased agents, that is, agents who erroneously anticipate the costs of future actions compared to their real costs. Specifically, the paper extends the original framework proposed by Akerlof (1991) for studying various aspects of human behavior related to time-inconsistent pl... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | 213,592 |
2005.13787 | Assessing Centrality Without Knowing Connections | We consider the privacy-preserving computation of node influence in distributed social networks, as measured by egocentric betweenness centrality (EBC). Motivated by modern communication networks spanning multiple providers, we show for the first time how multiple mutually-distrusting parties can successfully compute n... | false | false | false | true | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 179,100 |
2105.11601 | Personalized Transformer for Explainable Recommendation | Personalization of natural language generation plays a vital role in a large spectrum of tasks, such as explainable recommendation, review summarization and dialog systems. In these tasks, user and item IDs are important identifiers for personalization. Transformer, which is demonstrated with strong language modeling c... | false | false | false | false | true | true | true | false | true | false | false | false | false | false | false | false | false | false | 236,753 |
2106.03722 | Error Loss Networks | A novel model called error loss network (ELN) is proposed to build an error loss function for supervised learning. The ELN is in structure similar to a radial basis function (RBF) neural network, but its input is an error sample and output is a loss corresponding to that error sample. That means the nonlinear input-out... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 239,422 |
1611.06009 | Fuzzy Statistical Matrices for Cell Classification | In this paper, we generalize image (texture) statistical descriptors and propose algorithms that improve their efficacy. Recently, a new method showed how the popular Co-Occurrence Matrix (COM) can be modified into a fuzzy version (FCOM) which is more effective and robust to noise. Here, we introduce new fuzzy versions... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 64,111 |
1712.00900 | On the Effect of Shadowing Correlation on Wireless Network Performance | We propose and analyze a new shadowing field model meant to capture spatial correlations. The interference field associated with this new model is compared to that of the widely used independent shadowing model. Independent shadowing over links is adopted because of the resulting closed forms for performance metrics, a... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 86,003 |
2003.05837 | Top-1 Solution of Multi-Moments in Time Challenge 2019 | In this technical report, we briefly introduce the solutions of our team 'Efficient' for the Multi-Moments in Time challenge in ICCV 2019. We first conduct several experiments with popular Image-Based action recognition methods TRN, TSN, and TSM. Then a novel temporal interlacing network is proposed towards fast and ac... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 167,962 |
2009.10484 | Asymptotically Optimal Sampling-Based Motion Planning Methods | Motion planning is a fundamental problem in autonomous robotics that requires finding a path to a specified goal that avoids obstacles and takes into account a robot's limitations and constraints. It is often desirable for this path to also optimize a cost function, such as path length. Formal path-quality guarantees... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 196,905 |
2412.15826 | Using matrix-product states for time-series machine learning | Matrix-product states (MPS) have proven to be a versatile ansatz for modeling quantum many-body physics. For many applications, and particularly in one-dimension, they capture relevant quantum correlations in many-body wavefunctions while remaining tractable to store and manipulate on a classical computer. This has mot... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 519,279 |
1107.5951 | Optimal, scalable forward models for computing gravity anomalies | We describe three approaches for computing a gravity signal from a density anomaly. The first approach consists of the classical "summation" technique, whilst the remaining two methods solve the Poisson problem for the gravitational potential using either a Finite Element (FE) discretization employing a multilevel prec... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 11,508 |
2406.02950 | Joint Beam Search Integrating CTC, Attention, and Transducer Decoders | End-to-end automatic speech recognition (E2E-ASR) can be classified by its decoder architectures, such as connectionist temporal classification (CTC), recurrent neural network transducer (RNN-T), attention-based encoder-decoder, and Mask-CTC models. Each decoder architecture has advantages and disadvantages, leading pr... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 461,017 |
2403.00748 | Primal-Dual iLQR | We introduce a new algorithm for solving unconstrained discrete-time optimal control problems. Our method follows a direct multiple shooting approach, and consists of applying the SQP method together with an $\ell_2$ augmented Lagrangian primal-dual merit function. We use the LQR algorithm to efficiently solve the prim... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 434,082 |
2406.17697 | HGTDP-DTA: Hybrid Graph-Transformer with Dynamic Prompt for Drug-Target
Binding Affinity Prediction | Drug target binding affinity (DTA) is a key criterion for drug screening. Existing experimental methods are time-consuming and rely on limited structural and domain information. While learning-based methods can model sequence and structural information, they struggle to integrate contextual data and often lack comprehe... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 467,682 |
1806.07057 | Effect of Hyper-Parameter Optimization on the Deep Learning Model
Proposed for Distributed Attack Detection in Internet of Things Environment | This paper studies the effect of various hyper-parameters and their selection for the best performance of the deep learning model proposed in [1] for distributed attack detection in the Internet of Things (IoT). The findings show that there are three hyper-parameters that have more influence on the best performance ach... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 100,825 |
1502.06075 | A new network-based algorithm for human activity recognition in video | In this paper, a new network-transmission-based (NTB) algorithm is proposed for human activity recognition in videos. The proposed NTB algorithm models the entire scene as an error-free network. In this network, each node corresponds to a patch of the scene and each edge represents the activity correlation between the ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 40,445 |
2005.13189 | Decentralized Optimization On Time-Varying Directed Graphs Under
Communication Constraints | We consider the problem of decentralized optimization where a collection of agents, each having access to a local cost function, communicate over a time-varying directed network and aim to minimize the sum of those functions. In practice, the amount of information that can be exchanged between the agents is limited due... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 178,941 |
1702.03222 | Mining Electronic Health Records: A Survey | The continuously increasing cost of the US healthcare system has received significant attention. Central to the ideas aimed at curbing this trend is the use of technology, in the form of the mandate to implement electronic health records (EHRs). EHRs consist of patient information such as demographics, medications, lab... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 68,092 |
1807.07282 | Anomaly Detection for Water Treatment System based on Neural Network
with Automatic Architecture Optimization | We continue to develop our neural network (NN) based forecasting approach to anomaly detection (AD) using the Secure Water Treatment (SWaT) industrial control system (ICS) testbed dataset. We propose genetic algorithms (GA) to find the best NN architecture for a given dataset, using the NAB metric to assess the quality... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 103,288 |
cs/0703035 | On the Distortion SNR Exponent of Some Layered Transmission Schemes | We consider the problem of joint source-channel coding for transmitting K samples of a complex Gaussian source over T = bK uses of a block-fading multiple input multiple output (MIMO) channel with M transmit and N receive antennas. We consider the case when we are allowed to code over L blocks. The channel gain is assu... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 540,218 |
2211.08717 | SWIN-SFTNet : Spatial Feature Expansion and Aggregation using Swin
Transformer For Whole Breast micro-mass segmentation | Incorporating various mass shapes and sizes in training deep learning architectures has made breast mass segmentation challenging. Moreover, manual segmentation of masses of irregular shapes is time-consuming and error-prone. Though Deep Neural Network has shown outstanding performance in breast mass segmentation, it f... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 330,744 |
2310.02065 | VENOM: A Vectorized N:M Format for Unleashing the Power of Sparse Tensor
Cores | The increasing success and scaling of Deep Learning models demands higher computational efficiency and power. Sparsification can lead to both smaller models as well as higher compute efficiency, and accelerated hardware is becoming available. However, exploiting it efficiently requires kernel implementations, pruning a... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 396,696 |
2111.13850 | Temporal Context Mining for Learned Video Compression | We address end-to-end learned video compression with a special focus on better learning and utilizing temporal contexts. For temporal context mining, we propose to store not only the previously reconstructed frames, but also the propagated features into the generalized decoded picture buffer. From the stored propagated... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 268,409 |
2110.09936 | NeuralDiff: Segmenting 3D objects that move in egocentric videos | Given a raw video sequence taken from a freely-moving camera, we study the problem of decomposing the observed 3D scene into a static background and a dynamic foreground containing the objects that move in the video sequence. This task is reminiscent of the classic background subtraction problem, but is significantly h... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 261,981 |
2303.12343 | LD-ZNet: A Latent Diffusion Approach for Text-Based Image Segmentation | Large-scale pre-training tasks like image classification, captioning, or self-supervised techniques do not incentivize learning the semantic boundaries of objects. However, recent generative foundation models built using text-based latent diffusion techniques may learn semantic boundaries. This is because they have to ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 353,231 |
2410.04721 | ACDC: Autoregressive Coherent Multimodal Generation using Diffusion
Correction | Autoregressive models (ARMs) and diffusion models (DMs) represent two leading paradigms in generative modeling, each excelling in distinct areas: ARMs in global context modeling and long-sequence generation, and DMs in generating high-quality local contexts, especially for continuous data such as images and short video... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 495,412 |
2410.12843 | Exploring Prompt Engineering: A Systematic Review with SWOT Analysis | In this paper, we conduct a comprehensive SWOT analysis of prompt engineering techniques within the realm of Large Language Models (LLMs). Emphasizing linguistic principles, we examine various techniques to identify their strengths, weaknesses, opportunities, and threats. Our findings provide insights into enhancing AI... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 499,231 |
1906.06047 | Dynamic Term-Modal Logics for First-Order Epistemic Planning | Many classical planning frameworks are built on first-order languages. The first-order expressive power is desirable for compactly representing actions via schemas, and for specifying quantified conditions such as $\neg\exists x\mathsf{blocks\_door}(x)$. In contrast, several recent epistemic planning frameworks are bui... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | true | 135,198 |
2209.13012 | Survey on Fairness Notions and Related Tensions | Automated decision systems are increasingly used to take consequential decisions in problems such as job hiring and loan granting with the hope of replacing subjective human decisions with objective machine learning (ML) algorithms. However, ML-based decision systems are prone to bias, which results in yet unfair decis... | false | false | false | false | true | false | true | false | false | false | false | false | false | true | false | false | false | false | 319,735 |
2407.20274 | Exploring the Plausibility of Hate and Counter Speech Detectors with
Explainable AI | In this paper we investigate the explainability of transformer models and their plausibility for hate speech and counter speech detection. We compare representatives of four different explainability approaches, i.e., gradient-based, perturbation-based, attention-based, and prototype-based approaches, and analyze them q... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 477,122 |
2303.12992 | A Survey of Historical Learning: Learning Models with Learning History | New knowledge originates from the old. The various types of elements, deposited in the training history, are a large amount of wealth for improving learning deep models. In this survey, we comprehensively review and summarize the topic--``Historical Learning: Learning Models with Learning History'', which learns better... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 353,489 |
2306.08766 | A Copernican Revolution in Data | Half a century ago, Charles Bachman foresaw the significance and centrality of data in the digital world. In this short paper, we delve into the evolution of these ideas within the database community over the past decades. We believe that this historical analysis helps deepen our comprehension of the fundamental change... | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | true | false | 373,534 |
1507.04811 | Lift-Based Bidding in Ad Selection | Real-time bidding (RTB) has become one of the largest online advertising markets in the world. Today the bid price per ad impression is typically decided by the expected value of how it can lead to a desired action event (e.g., registering an account or placing a purchase order) to the advertiser. However, this industr... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 45,217 |
2006.07995 | BatVision with GCC-PHAT Features for Better Sound to Vision Predictions | Inspired by sophisticated echolocation abilities found in nature, we train a generative adversarial network to predict plausible depth maps and grayscale layouts from sound. To achieve this, our sound-to-vision model processes binaural echo-returns from chirping sounds. We build upon previous work with BatVision that c... | false | false | true | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 182,033 |
2403.02253 | KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for
Enhancing Reference-Based Phishing Detection | Phishing attacks have inflicted substantial losses on individuals and businesses alike, necessitating the development of robust and efficient automated phishing detection approaches. Reference-based phishing detectors (RBPDs), which compare the logos on a target webpage to a known set of logos, have emerged as the stat... | false | false | false | false | true | false | true | false | true | false | false | false | true | false | false | false | false | false | 434,745 |
2203.07856 | Improved Multi-label Classification under Temporal Concept Drift:
Rethinking Group-Robust Algorithms in a Label-Wise Setting | In document classification for, e.g., legal and biomedical text, we often deal with hundreds of classes, including very infrequent ones, as well as temporal concept drift caused by the influence of real world events, e.g., policy changes, conflicts, or pandemics. Class imbalance and drift can sometimes be mitigated by ... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 285,587 |
2204.13176 | Divisible Codes for Quantum Computation | Divisible codes are defined by the property that codeword weights share a common divisor greater than one. They are used to design signals for communications and sensing, and this paper explores how they can be used to protect quantum information as it is transformed by logical gates. Given a CSS code $\mathcal{C}$, we... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 293,724 |
1703.01310 | Count-Based Exploration with Neural Density Models | Bellemare et al. (2016) introduced the notion of a pseudo-count, derived from a density model, to generalize count-based exploration to non-tabular reinforcement learning. This pseudo-count was used to generate an exploration bonus for a DQN agent and combined with a mixed Monte Carlo update was sufficient to achieve s... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 69,338 |
2109.10279 | Ranking Feature-Block Importance in Artificial Multiblock Neural
Networks | In artificial neural networks, understanding the contributions of input features on the prediction fosters model explainability and delivers relevant information about the dataset. While typical setups for feature importance ranking assess input features individually, in this study, we go one step further and rank the ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 256,568 |
2304.11834 | Robust Tickets Can Transfer Better: Drawing More Transferable
Subnetworks in Transfer Learning | Transfer learning leverages feature representations of deep neural networks (DNNs) pretrained on source tasks with rich data to empower effective finetuning on downstream tasks. However, the pretrained models are often prohibitively large for delivering generalizable representations, which limits their deployment on ed... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 359,990 |
1911.09548 | A parallel space-time multigrid method for the eddy-current equation | We expand the applicabilities and capabilities of an already existing space-time parallel method based on a block Jacobi smoother. First we formulate a more detailed criterion for spatial coarsening, which enables the method to deal with unstructured meshes and varying material parameters. Further we investigate the ap... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 154,553 |
1710.06512 | Pose-based Deep Gait Recognition | Human gait or walking manner is a biometric feature that allows identification of a person when other biometric features such as the face or iris are not visible. In this paper, we present a new pose-based convolutional neural network model for gait recognition. Unlike many methods that consider the full-height silhoue... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 82,784 |
2401.06925 | Modeling Latent Selection with Structural Causal Models | Selection bias is ubiquitous in real-world data, and can lead to misleading results if not dealt with properly. We introduce a conditioning operation on Structural Causal Models (SCMs) to model latent selection from a causal perspective. We show that the conditioning operation transforms an SCM with the presence of an ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 421,347 |
1712.01097 | Generalized Grounding Graphs: A Probabilistic Framework for
Understanding Grounded Commands | Many task domains require robots to interpret and act upon natural language commands which are given by people and which refer to the robot's physical surroundings. Such interpretation is known variously as the symbol grounding problem, grounded semantics and grounded language acquisition. This problem is challenging b... | false | false | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | 86,046 |
2007.01510 | MIRA: Leveraging Multi-Intention Co-click Information in Web-scale
Document Retrieval using Deep Neural Networks | We study the problem of deep recall model in industrial web search, which is, given a user query, retrieve hundreds of most relevance documents from billions of candidates. The common framework is to train two encoding models based on neural embedding which learn the distributed representations of queries and documents... | false | false | false | false | false | true | true | false | true | false | false | false | false | false | false | false | false | false | 185,457 |
1804.09288 | A Closer Look at Weak Label Learning for Audio Events | Audio content analysis in terms of sound events is an important research problem for a variety of applications. Recently, the development of weak labeling approaches for audio or sound event detection (AED) and availability of large scale weakly labeled dataset have finally opened up the possibility of large scale AED.... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 95,939 |
2405.06363 | Projection by Convolution: Optimal Sample Complexity for Reinforcement
Learning in Continuous-Space MDPs | We consider the problem of learning an $\varepsilon$-optimal policy in a general class of continuous-space Markov decision processes (MDPs) having smooth Bellman operators. Given access to a generative model, we achieve rate-optimal sample complexity by performing a simple, \emph{perturbed} version of least-squares val... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 453,272 |
1202.3215 | Data quality measurement on categorical data using genetic algorithm | Data quality on categorical attribute is a difficult problem that has not received as much attention as numerical counterpart. Our basic idea is to employ association rule for the purpose of data quality measurement. Strong rule generation is an important area of data mining. Association rule mining problems can be con... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 14,336 |
2408.08005 | Inversion-DeepONet: A Novel DeepONet-Based Network with Encoder-Decoder
for Full Waveform Inversion | Full waveform inversion (FWI) plays a crucial role in the field of geophysics. There has been lots of research about applying deep learning (DL) methods to FWI. The success of DL-FWI relies significantly on the quantity and diversity of the datasets. Nevertheless, existing FWI datasets, like OpenFWI, where sources have... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 480,815 |
2106.08590 | Domain Consistency Regularization for Unsupervised Multi-source Domain
Adaptive Classification | Deep learning-based multi-source unsupervised domain adaptation (MUDA) has been actively studied in recent years. Compared with single-source unsupervised domain adaptation (SUDA), domain shift in MUDA exists not only between the source and target domains but also among multiple source domains. Most existing MUDA algor... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 241,345 |
2204.14079 | Fix the Noise: Disentangling Source Feature for Transfer Learning of
StyleGAN | Transfer learning of StyleGAN has recently shown great potential to solve diverse tasks, especially in domain translation. Previous methods utilized a source model by swapping or freezing weights during transfer learning, however, they have limitations on visual quality and controlling source features. In other words, ... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 294,047 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.